sos5.1.0
low
This signature detects e-mail attachments that have the
extension .bas and were received via POP3. Because .BASs
(Microsoft Visual Basic Class Module) files contain
executable code, this may indicate an incoming e-mail virus.
Attackers may create malicious executables, tricking users
into executing the file and infecting the system.
POP3:EXT:DOT-BAS
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.bat' received via POP3. This may indicate an
incoming e-mail virus. .BATs (executable files) contain one
or more scripts. Attackers may create malicious executables,
tricking the user into executing the file and infecting the
system.
POP3:EXT:DOT-BAT
sos5.1.0
high
This signature detects e-mail attachments that have the
extension .chm and were received via POP3. Because .CHMs
(Compiled HTML Help File) files can contain scripts, this
may indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the files and
infecting the system.
POP3:EXT:DOT-CHM
sos5.1.0
high
This signature detects e-mail attachments with the
extension '.cmd' sent via POP3. This may indicate an
incoming e-mail virus. CMD files contain commands that
when executed can cause significant damage to a windows
system.
POP3:EXT:DOT-CMD
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.com' received via POP3. This may indicate an
incoming e-mail virus. .COMs (executable files) contain one
or more scripts. Attackers may create malicious executables,
tricking the user into executing the file and infecting the
system.
POP3:EXT:DOT-COM
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.cpl' received via POP3. This may indicate an
incoming e-mail virus. CPLs (Control Panel eLements) are
standard Microsoft Windows files that contain Windows
Control Panel settings. Attackers may hide malicious
executables within a CPL file, tricking users into executing
the file and infecting the system.
POP3:EXT:DOT-CPL
sos5.1.0
high
This signature detects e-mail attachments that have the
extension .crt and were received via POP3. Because .CRTs
(Security Certificate) files can contain executable code, this
may indicate an incoming e-mail virus. Attackers may create
malicious executable code, tricking users into executing the
file and infecting the system.
POP3:EXT:DOT-CRT
sos5.1.0
high
This signature detects e-mail attachments with the
extension '.exe' sent via POP3. This may indicate an incoming
e-mail virus. EXEs (Executable files) contain one or more
scripts. Attackers may create malicious executables, tricking
the user into executing the file and infecting the system.
POP3:EXT:DOT-EXE
917
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...